• Title/Summary/Keyword: personal information management

Search Result 1,764, Processing Time 0.033 seconds

Implementation & Design of the University Personal Information Management System -University PIMS- (대학생 전용 개인정보관리시스템 설계 및 구현 UPIMS의 기능)

  • Choi, Jang-Ik;Choi, Sung
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2001.11a
    • /
    • pp.195-198
    • /
    • 2001
  • UPIMS(University Personal Information Management System) 서비스는 컴퓨터를 이용하여 대학생들의 일정 관리를 위한 서비스 였으나, 인터넷과 무선 통신이 발달하면서, 사용자들이 개개인의 정보를 전화 단말기와 Office용 PC, 가정용 PC에서도 정보를 공유하고자 하는 요구가 발생하였고, 각 정보를 팀원간 공유를 통해 사용자 자신이 언제, 어디서나 원하는 정보를 전달받기를 원하며, 전달해주기를 원하고 있다. 이에 무선 인터넷 서비스를 통해 다양한 무선 단말기에 구애받지 않고, 사용자 정보를 관리할 수 있는 서비스를 가능하게 하기 위하여, 무선통신 기반의 PIMS(Personal Information Management System) 서버를 구축하여 개개인의 일정관리, 주소록 관리, 그룹 관리 학사일정 등의 다양한 개개인의 정보 맞춤 서비스를 수행하는 기능을 제공한다. 뿐만 아니라, UPIMS서버는 인터넷상의 다양한 정보를 관리 및 저장하여 가입자의 요구시 사용자 단말기에 적합한 형태로 정보를 변환하여 전송하는 역할을 하며 예약 시스템에도 활용 가능하게 된다.

  • PDF

Analysis of Loss Expectancy on Personal Information leakage using Quantitative Invest Decision Model (투자결정 모델을 활용한 개인정보유출의 기대손실 분석)

  • Kim, Jeong Yeon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.93-106
    • /
    • 2015
  • Providing trading partners with personal information to establish an e-commerce financial transaction is inevitable. Most e-commerce companies keep personal information and transaction data for user's convenience and develop additional services as their applications. However, keeping personal information increases the likelihood of identity theft causing direct or indirect damage while it may simplify repetitive financial transactions. This study introduces risk management methods based on quantitative and qualitative analysis including demand-supply curve model and Gordon & Loeb model to analyze the risks for security management. The empirical analysis with survey results from KISA (Korea Information Security Agency) shows that the root cause of different statistics of personal information leakage incidents according to core business of internet companies is the difference in their Loss Expectancy caused by them. Also we suggest disciplinary compensation and higher standard for personal information protection as a solution to prevent the variation of investment on it between individual companies.

Development of a Management System for Image and Personal Information for the Development of a Standard Brain for Diverse Koreans (다양한 한국인의 표준뇌를 개발하기 위한 영상 및 개인정보 관리 시스템의 개발)

  • 정순철;최도영;이정미;박현욱;손진훈
    • Journal of Biomedical Engineering Research
    • /
    • v.25 no.1
    • /
    • pp.77-82
    • /
    • 2004
  • The purpose of this study is to establish a reference for image acquisition for completion of a standard brain for diverse Korean population, and to develop a management system that saves and manage database of the acquired brain image and personal information of those who were tested. 3D MP-RAGE technique, which has excellent SNR and CNR and reduces the times for image acquisition, was selected for anatomical Image acquisition, and parameter values were obtained for the optimal image acquisition. The database management system was devised to obtain not only anatomical image data but also subjects' basic demographic factors, medical history, handedness inventory state-trait anxiety inventory, A-type personality inventory, self-assessment depression inventory questionnaires of Sasang Constitution Mini-Mental State Examination, intelligence test, and personality test via a survey questionnaire and to save and manage the results of the tests. In addition, this system was designed to have functions of saving, inserting, deleting, searching, and Printing of image da a and personal information of subjects, and to have accessibility to them as well as automatic connection setup with ODBC. This newly developed system may have major contribution to the completion of a standard brain of diverse Korean population in that it can save and manage their image date and personal information.

A Study on Critical Success Factors for Implementing Governance of Personal Information Protection (개인정보보호 거버넌스의 효과적인 구현을 위한 핵심성공요인에 관한 연구)

  • Kim, Jung-Duk;Hwang, Soo-Ha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.197-203
    • /
    • 2011
  • Personal information protection need to be addressed in terms of enterprise-wide and business issues, not just an information processing issue. Therefore, governance of personal information protection, which stress the importance of top management's roles aud responsibilities for personal information protection, has been noticed as an important agenda to resolve. The paper defines the concept of personal information protection governance and proposes the severn critical success factors (CSFs) for implementing the governance scheme. The proposed CSFs are tested in terms of feasibility and materiality by using the focus group interviews.

Traceability Enhancement Technique Through the Integration of Software Configuration Management and Personal Working Space (소프트웨어 형상관리와 작업공간의 통합을 통한 산출물의 추적성 향상 기법)

  • Kim, Dae-Yeob;Youn, Cheong
    • The KIPS Transactions:PartD
    • /
    • v.16D no.6
    • /
    • pp.899-910
    • /
    • 2009
  • Software productivity and quality improvement through software configuration management is based on organized and consistent change management. In change management, artifact identified as configuration item should be able to provide its changed history to the members in group and the members should be able to track down the changes made for the corresponding artifact. General software configuration management systems provide tracking information for artifacts only within the configuration management system, and it does not go further to changes that occur within personal working space. This paper provides a solution that helps tracking down changes that occur not only in configuration management, but also personal artifact's changes through the integration of configuration management system and personal working space. A revised version in configuration management system is connected to the artifact version of the working space by the tagging technique, and traceability can be managed more effectively by sharing the tracking information.

Transition from Diagnosis to Assessment System in Public Institution Personal Information Protection Management: Policy Approaches and Recommendations (공공기관 개인정보보호 관리 수준 진단에서 평가 체계로의 전환 : 정책적 접근 및 제언)

  • Youn-hee Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.801-809
    • /
    • 2024
  • In the digital age, the importance of personal information has magnified, underscoring the need for enhanced personal information protection, especially within public institutions. Despite ongoing efforts since 2007, significant breaches in public sector information underline persistent vulnerabilities. This study advocates for a transition from a diagnostic to an assessment framework to fortify privacy management in public institutions, as mandated by recent legislative revisions. The amended Personal Information Protection Act introduces an assessment approach, aiming to comprehensively assess and mitigate risks by expanding the scope of evaluation and implementing robust regulatory measures. This study examines the limitations of the current diagnostic practices through literature review and case analysis and proposes a systematic approach to adopting the new assesment system. By enhancing the assessment framework, the study expects to improve the effectiveness of personal information management in public institutions, thereby restoring public trust and ensuring a stable progression into a more secure digital era. The transition to an assessment system is designed not only to address the gaps in the current framework but also to provide a methodical assessment that supports ongoing improvement and compliance with enhanced legal standards.

A Study on Smart Tourism Based on Face Recognition Using Smartphone

  • Ryu, Ki-Hwan;Lee, Myoung-Su
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.39-47
    • /
    • 2016
  • This study is a smart tourism research based on face recognition applied system that manages individual information of foreign tourists to smartphone. It is a way to authenticate by using face recognition, which is biometric information, as a technology applied to identification inquiry, immigration control, etc. and it is designed so that tourism companies can provide customized service to customers by applying algorism to smartphone. The smart tourism system based on face recognition is a system that prepares the reception service by sending the information to smartphone of tourist service company guide in real time after taking faces of foreign tourists who enter Korea for the first time with glasses attached to the camera. The smart tourism based on face recognition is personal information recognition technology, speech recognition technology, sensing technology, artificial intelligence personal information recognition technology, etc. Especially, artificial intelligence personal information recognition technology is a system that enables the tourism service company to implement the self-promotion function to commemorate the visit of foreign tourists and that enables tourists to participate in events and experience them directly. Since the application of smart tourism based on face recognition can utilize unique facial data and image features, it can be beneficially utilized for service companies that require accurate user authentication and service companies that prioritize security. However, in terms of sharing information by government organizations and private companies, preemptive measures such as the introduction of security systems should be taken.

A study on the Development Plan of Personal Information Protection System (개인정보보호 체계 발전 방안에 대한 연구)

  • Sang-Hyun Joo;Byoung-Hoon Choi;Jin-Yong Lee;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.167-176
    • /
    • 2024
  • The Personal Information Protection Commission was launched in August 2020 as an integrated control tower for personal information protection, but several problems have been pointed out in the personal information protection operation system. First, despite the fact that Korea's personal information protection system has an integrated legal system that regulates both the public and private sectors, it has been pointed out that it is difficult to carry out smooth personal information protection functions due to incomplete integration of protection functions, such as the Financial Services Commission being in charge of personal credit information protection and the Korea Communications Commission being in charge of personal location information protection. Next, despite the increasing number of public sector personal information leakage incidents, there is a lack of personnel with expertise and specialized support organizations to efficiently investigate them, and there is a concern that the lack of an efficient response system to personal information infringement by global IT companies in Korea in the era of digital commerce may weaken the protection of citizens' personal information. In order to solve these problems, I reviewed overseas cases and literature and proposed the following measures. First, it is necessary to centralize the personal information protection supervision function for credit information and location information to the Personal Information Protection Commission. Second, it is necessary to secure expertise by securing specialized personnel and establishing specialized institutions to respond to public sector personal information leakage incidents. Third, it is necessary to revitalize the domestic agency designation system and establish an international cooperation system to protect people's personal information in the digital commerce era. I believe that these measures to develop the personal information protection system will lead to more systematic personal information protection.

A Design of Electronic Health Records Partial Encryption Method for Protecting Patient's Information on the U-Healthcare Environment (U-Healthcare 환경에서 환자정보보호를 위한 전자차트 부분 암호화 기법 설계)

  • Shin, Seon Hee;Kim, Hyun Chul;Park, Chan Kil;Jeon, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.91-101
    • /
    • 2010
  • By using the U-Healthcare environment, it is possible to receive the health care services anywhere anytime. However, since the user's personal information can be easily exposed in the U-Healthcare environment, it is necessary to strengthen the security system. This thesis proposes the technique which can be used to protect the personal medical records at hospital safely, in order to avoid the exposure of the user's personal information which can occur due to the frequent usage of the electronic chart according to the computerization process of medical records. In the proposed system, the following two strategies are used: i) In order to reduce the amount of the system load, it is necessary to apply the partial encryption process for electronic charts. ii) Regarding the user's authentication process for each patient, the authentication number for each electronic chart, which is in the encrypted form, is transmitted through the patient's mobile device by the National Health Insurance Corporation, when the patient register his or her application at hospital. Regarding the modern health care services, it is important to protect the user's personal information. The proposed technique will be an important method of protecting the user's information.

FinDID : A DID service supporting the standard service scheme for the financial sector

  • Lee, Young-Eun;Kim, Hye-Won;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.127-138
    • /
    • 2022
  • In this paper, we present FinDID (Financial Decentralized IDentity), a blockchain-based DID(Decentralized IDentity) service that can flexibly control personal information or credentials through a systematic verification method while complying with the standard service scheme of decentralized identity for the financial sector. DID is an identity management system used in a decentralized environment without a specific certification authority, and as a technology that allows users to control their own information, it can realize self-sovereignty over users' own personal information. Through FinDID, users receive credentials that authenticate their various personal information from the issuer, select only the claims required by the target financial service using their personal electronic wallet, create presentations from credentials. Then they submit it to the financial service, leading to their qualification from the service. FinDID consists of electronic wallet, credential issuer, credential storage, DID service including DID management contract and credential management contract, and financial services using this service scheme. The DID service manages each user's DID and supports all verification processes of the associated identity management scheme.